Login / Signup
Encrypted Multi-Maps with Computationally-Secure Leakage.
Seny Kamara
Tarik Moataz
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
factor authentication
encryption key
encryption scheme
security issues
information leakage
encryption decryption
neural network
security protocols